Enterprise Threat Protector

Proactive protection against zero-day malware

Enterprise Threat Protector proactively identifies, blocks, and mitigates targeted threats such as malware, ransomware, phishing, DNS data exfiltration and advanced zero-day attacks. Enterprise Threat Protector is a Secure Internet Gateway (SIG) that enables security teams to ensure that users and devices can securely connect to the Internet, regardless of wherever they are connecting from, without the complexity associated with legacy security approaches.

Enterprise Threat Protector is a cost-effective security solution that can be installed and setup in minutes.

Learn More Buy Now Try Now
Spotlight on Enterprise Threat Protector
???Watch the Video???

Improve Security Posture Everywhere

Your recursive DNS is likely unprotected and could be exploited. Add an additional layer of security in minutes that uses DNS as a security control point to uniformly and immediately block malicious domains and communications for all your users, whether they are on- or off-network.
Learn More

Direct Internet Access

Secure your branch direct internet access (DIA) traffic quickly with zero complexity and without replicating your security stack at every branch.
Learn More

Guest Wi-Fi Protection

Enforce an Acceptable Use policy across your guest wi-fi for brand and/or user protection.
Learn More

Customer Case Study: Perform Group

Working with Akamai, we were able to quickly isolate, contain, and remove threats to our infrastructure, delivering greater integrity with less effort.
Daniel Schatz, CISO, Perform Group

Read More

Enterprise Threat Protector Features

Real-time Akamai Threat Intelligence

Up-to-the minute threat intelligence with low false positives based on Akamai’s visibility into 15-30% of daily web traffic, 2.2 Trillion Recursive DNS requests, and proprietary Data Science algorithms.

Analysis and Reporting

Real-time insight via an easy-to-use dashboard into all outbound enterprise DNS traffic, as well as threat and acceptable use policy events.

Inline Real-Time Payload Analysis

Three advanced malware detection engines identify and block complex advanced threats and improve zero-day protection.

Logging

DNS logs are retained for 30 days and can easily be exported as a .CSV file or integrated into a SIEM for further analysis.

Acceptable Use Policy Management

Customize and enforce your enterprise acceptable use policy and ensure compliance by limiting which content categories can and cannot be accessed.

Security Insights

Quickly understand why Akamai has added a domain or a URL to its threat intelligence lists.

Customer-Categorized Threat Customization

Integrate existing threat intelligence feeds, extending value from your existing security investments.

DNSSEC

All DNS requests sent to Enterprise Threat Protector have DNSSEC enabled.

How Does Enterprise Threat Protector Work?

Akamai Enterprise Threat Protector Overview

Enterprise Threat Protector uses multiple layers of protection—DNS, URL, and inline payload analysis—to deliver optimal security and reduced complexity, without impacting performance.

By simply directing your external recursive DNS traffic to Enterprise Threat Protector, all requested domains are checked against Akamai’s real-time domain risk scoring threat intelligence.

Safe domains are resolved as normal, malicious domains are blocked, and risky domains are sent to a smart selective proxy where the HTTP or HTTPS URLs are inspected to determine if they are malicious. The HTTP and HTTPS payloads from risky domains are then scanned in real-time using multiple advanced malware-detection engines.

Enterprise Threat Protector Insights